—Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkabili...
We study solutions to the problem of evaluating image similarity in the context of content-based image retrieval (CBIR). Retrieval is formulated as a classification problem, wher...
Software evolution is characterized by inevitable changes of software and increasing software complexities, which in turn may lead to huge costs unless rigorously taking into acco...
Hongyu Pei Breivold, Ivica Crnkovic, Peter J. Erik...
This paper examines contract practices between suppliers and retailers in the agricultural seed industry. We construct and analyze single-retailer models of various contract types...
Due to its convenient, low physical restraint, and electric noise tolerant features, functional near-infrared spectroscopy (fNIRS) is expected to be a useful tool in monitoring use...